IN CASE YOU MISSED IT!

Chatbots News Wednesday, May 9 Basestriker attack, Microsoft-owned secure urls, Process doppelgänging technique & more…

[vc_row] [vc_column] [vc_column_text]

What’s new?

[/vc_column_text] [/vc_column][/vc_row] [vc_row el_id=”thehackernews_com_2018_05_microsoft_safelinks_phishing_html_utm_source_feedburner_utm_medium_feed”] [vc_column width=”1/2″] [vc_separator] [vc_column_text]

Hackers Found Using A New Way to Bypass Microsoft Office 365 Safe Links

[/vc_column_text] [vc_column_text el_class=”topfeed-summary-list”]

  • Security researchers revealed a way around that some hacking groups have been found using in the wild to bypass a security feature of Microsoft Office 365, which is originally designed to protect users from malware and phishing attacks.Dubbed Safe Links, the feature has been included in Office 365 software as…
  • If Microsoft’s scanners detect any malicious element, it then warns users about it, and if not, it redirects the user to the original link.However, researchers at cloud security company Avanan have revealed how attackers have been bypassing the Safe Links feature by using a technique called, .
  • BaseStriker attack involves using the tag in the header of an HTML emailwhich is used to defines a default base URI, or URL, for relative links in a document or web page.In other words, if the URL is defined, then all subsequent relative links will use that URL as a…
  • However, Gmail users and those protecting their Office 365 with Mimecast are not impacted by this issue.So far, researchers have only seen hackers using the baseStriker attack to send phishing emails, but they believe the attack can be leveraged to distribute ransomware, malware and other malicious software.Avanan reported the issue…

[/vc_column_text] [vc_column_text el_class=”topfeed-tags”] Tags: basestriker attack, Safe Links, Microsoft-owned secure URLs, traditional phishing email, Advanced Threat Protection [/vc_column_text] [/vc_column] [vc_column width=”1/2″] [vc_separator] [vc_column_text el_class=”topfeed-tweet”]

[/vc_column_text] [vc_column_text el_class=”topfeed-embedly”] Hackers Found Using A New Way to Bypass Microsoft Office 365 Safe Links [/vc_column_text] [/vc_column] [/vc_row] [vc_row el_id=”www_ehackingnews_com_2018_05_synack_ransomware_adopts_doppelganging_html_”] [vc_column width=”1/2″] [vc_separator] [vc_column_text]

SynAck Ransomware Adopts Doppelganging Technique To Evade Detection

[/vc_column_text] [vc_column_text el_class=”topfeed-summary-list”]

  • Security Researchers have spotted a new and improved version of the SynAck ransomware that uses a new Process Doppelganging technique, which makes the malware hard to find and stop.The Process Doppelgnging technique abuses built-in Windows function, i.e., NTFS Transactions and an outdated implementation of Windows process loader to launch a…
  • This technique evades process monitoring tools and anti-virus software that a legitimate process is running.
  • The main purpose of the technique is to use NTFS transactions to launch a malicious process from the transacted file so that the malicious process looks like a legitimate one, wrote Anton Ivanov, Fedor Sinitsyn and Orkhan Mamedov, security researchers with Kaspersky Lab.SynAck ransomware first surfaced in Sept. 2017 when…
  • The ability of the Process Doppelgnging technique to sneak malware past the latest security measures represents a significant threat; one that has, not surprisingly, quickly been seized upon by attackers, Ivanov said, in a statement.
  • Our research shows how the relatively low-profile, targeted ransomware SynAck used the technique to upgrade its stealth and infection capability.

[/vc_column_text] [vc_column_text el_class=”topfeed-tags”] Tags: Process Doppelgänging technique, malicious process, ntfs transactions, Process Doppelganging technique, legitimate process [/vc_column_text] [/vc_column] [vc_column width=”1/2″] [vc_separator] [vc_column_text el_class=”topfeed-tweet”]

[/vc_column_text] [vc_column_text el_class=”topfeed-embedly”] SynAck Ransomware Adopts Doppelganging Technique To Evade Detection [/vc_column_text] [/vc_column] [/vc_row] [vc_row el_id=”www_viruss_eu_security_news_googles_ml_kit_offers_easy_machine_learning_apis_for_android_and_ios__”] [vc_column width=”1/2″] [vc_separator] [vc_column_text]

Google’s ML Kit offers easy machine learning APIs for Android and iOS

[/vc_column_text] [vc_column_text el_class=”topfeed-summary-list”]

[/vc_column_text] [vc_column_text el_class=”topfeed-tags”] Tags: website uses cookies, add/delete source, correct backlink, experimental project, content source [/vc_column_text] [/vc_column] [vc_column width=”1/2″] [vc_separator] [vc_column_text el_class=”topfeed-tweet”]

[/vc_column_text] [vc_column_text el_class=”topfeed-embedly”] Google’s ML Kit offers easy machine learning APIs for Android and iOS | Antivirus and Security news [/vc_column_text] [/vc_column] [/vc_row] [vc_row el_id=”www_viruss_eu_security_news_red_hat_smitten_by_secure_enclaves_cos_some_sysadmins_are_evil__”] [vc_column width=”1/2″] [vc_separator] [vc_column_text]

Red Hat smitten by secure enclaves ‘cos some sysadmins are evil

[/vc_column_text] [vc_column_text el_class=”topfeed-summary-list”]

[/vc_column_text] [vc_column_text el_class=”topfeed-tags”] Tags: website uses cookies, add/delete source, correct backlink, experimental project, content source [/vc_column_text] [/vc_column] [vc_column width=”1/2″] [vc_separator] [vc_column_text el_class=”topfeed-tweet”]

[/vc_column_text] [vc_column_text el_class=”topfeed-embedly”] Red Hat smitten by secure enclaves ‘cos some sysadmins are evil | Antivirus and Security news [/vc_column_text] [/vc_column] [/vc_row] [vc_row el_id=”www_viruss_eu_security_who_wants_to_go_threat_hunting__”] [vc_column width=”1/2″] [vc_separator] [vc_column_text]

Who wants to go threat hunting?

[/vc_column_text] [vc_column_text el_class=”topfeed-summary-list”]

  • Ive been a lot of things in my professional career including paramedic, accountant, computer trainer, PC/network technician, VP of IT, consultant and writer.
  • You get paid to break into places, work with cool people, and learn a lot.
  • Best of all, if you couldnt break into a place, the customer would be delighted and brag about how their computer security defenses didnt fall to a sustained hacking test.

[/vc_column_text] [vc_column_text el_class=”topfeed-tags”] Tags: sustained hacking test, PC/network technician, add/delete source, penetration tester, correct backlink [/vc_column_text] [/vc_column] [vc_column width=”1/2″] [vc_separator] [vc_column_text el_class=”topfeed-tweet”]

[/vc_column_text] [vc_column_text el_class=”topfeed-embedly”] Who wants to go threat hunting? | Antivirus and Security news [/vc_column_text] [/vc_column] [/vc_row]